|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1993 occurrences of 1129 keywords
|
|
|
Results
Found 5500 publication records. Showing 5500 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
166 | Ran Raz, Amir Shpilka |
On the Power of Quantum Proofs. |
CCC |
2004 |
DBLP DOI BibTeX RDF |
|
106 | Aggelos Kiayias, Moti Yung |
Self Protecting Pirates and Black-Box Traitor Tracing. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
99 | Steven Halim, Roland H. C. Yap, Hoong Chuin Lau |
An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Bogdan Korel |
Black-Box Understanding of COTS Components. |
IWPC |
1999 |
DBLP DOI BibTeX RDF |
Black-Box understanding, Interface probing, Black-box testing, Automated test generation, COTS component, White-box testing |
96 | Per Kristian Lehre, Carsten Witt |
Black-box search by unbiased variation. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
black-box complexity, runtime analysis |
95 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
Black-box constructions for secure computation. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
theory of cryptography, oblivious transfer, secure computation, black-box reductions |
92 | Sergei Kojarski, David H. Lorenz |
Comparing White-Box, Black-Box, and Glass-Box Composition of Aspect Mechanisms. |
ICSR |
2006 |
DBLP DOI BibTeX RDF |
|
90 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
85 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
85 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
85 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
85 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
85 | Amrit Tiwana |
Beyond the Black Box: Knowledge Overlaps in Software Outsourcing. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
congruence framework, software project risk, black-box development, knowledge management, software development, outsourcing |
85 | Tatsuyuki Matsushita, Hideki Imai |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
Public-key traitor tracing, Black-box tracing, Self-defensive pirates |
85 | Tatsuyuki Matsushita |
A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Flexible revocation, Black-box tracing, Traitor tracing |
84 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
80 | Yehuda Lindell |
Lower Bounds and Impossibility Results for Concurrent Self Composition. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Self and general composition, Non-black-box and black-box simulation, Lower bounds, Secure computation, Protocol composition, Impossibility results |
80 | Conor Nugent, Padraig Cunningham |
A Case-Based Explanation System for Black-Box Systems. |
Artif. Intell. Rev. |
2005 |
DBLP DOI BibTeX RDF |
black-box systems, case-based reasoning, explanation |
79 | Sami Beydeda, Volker Gruhn |
Integrating White- and Black-Box Techniques for Class-Level Regression Testing. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
Integrated White- and Black-Box Testing, Class-level Testing, Regression Testing |
78 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Aggelos Kiayias, Moti Yung |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
error correcting codes, traitor tracing |
78 | Amos Beimel, Tal Malkin |
A Quantitative Approach to Reductions in Secure Computation. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Gerald Kotonya |
An Architecture-Centric Development Environment for Black-Box Component-Based Systems. |
ECSA |
2008 |
DBLP DOI BibTeX RDF |
black-box components, architecture, Development environment |
74 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
74 | Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, Gilles Villard |
Faster inversion and other black box matrix computations using efficient block projections. |
ISSAC |
2007 |
DBLP DOI BibTeX RDF |
black box linear algebra, linear system solving, sparse integer matrix, structured integer matrix |
74 | Mark Last, Shay Eyal, Abraham Kandel |
Effective Black-Box Testing with Genetic Algorithms. |
Haifa Verification Conference |
2005 |
DBLP DOI BibTeX RDF |
Genetic algorithms, Fuzzy logic, Computational intelligence, Black-box testing, Test prioritization |
74 | Shoichi Hirose |
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
block cipher, black-box model, double-block-length hash function |
74 | Patrick J. Schroeder, Bogdan Korel |
Black-box test reduction using input-output analysis. |
ISSTA |
2000 |
DBLP DOI BibTeX RDF |
input-output analysis, test reduction, black-box testing, combinatorial testing |
74 | Zhonglin He, Geoff Staples, Margaret Ross 0001, Ian Court |
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
software maintenance testing, software usage testing, software crash diagnosis, software black box mechanism |
72 | Boaz Barak |
Non-black-box Techniques in Cryptography. |
CSR |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
72 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
72 | B. David Saunders |
Black box methods for least squares problems. |
ISSAC |
2001 |
DBLP DOI BibTeX RDF |
|
68 | Kwang Ik Seo, Eun Man Choi |
Comparison of Five Black-box Testing Methods for Object-Oriented Software. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
Comparison of testing methods, Performance of testing methods, Specification-based test, Black-box test |
68 | Aman Shaikh, Albert G. Greenberg |
Experience in black-box OSPF measurement. |
Internet Measurement Workshop |
2001 |
DBLP DOI BibTeX RDF |
SPF calculation, black-box measurements, routing, OSPF |
66 | Ahto Buldas, Sven Laur, Margus Niitsoo |
Oracle Separation in the Non-uniform Model. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Amir Shpilka, Ilya Volkovich |
Read-once polynomial identity testing. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, identity testing, read-once formulas, reconstruction, arithmetic circuits |
66 | Boaz Barak, Yehuda Lindell |
Strict polynomial-time in simulation and extraction. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Aggelos Kiayias, Moti Yung |
On Crafty Pirates and Foxy Tracers. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Eddie Davis, Marianthi G. Ierapetritou |
A kriging based method for the solution of mixed-integer nonlinear programs containing black-box functions. |
J. Glob. Optim. |
2009 |
DBLP DOI BibTeX RDF |
Optimization, Mathematical modeling, Kriging, Response surface, Black-box models |
63 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
63 | Tobias Storch |
On the impact of objective function transformations on evolutionary and black-box algorithms. |
Genet. Program. Evolvable Mach. |
2006 |
DBLP DOI BibTeX RDF |
Black-box algorithm, Evolutionary algorithm, Runtime analysis |
63 | William J. Turner |
Preconditioners for singular black box matrices. |
ISSAC |
2005 |
DBLP DOI BibTeX RDF |
Wiedemann method, black box linear algebra, rank preconditioner, singular linear system, switching network, Toeplitz matrix |
63 | Stephanie White, Herbert Warner |
A Process for Specifying Black Box Behavior, Demonstrated in a Case Study. |
ICECCS |
1996 |
DBLP DOI BibTeX RDF |
software engineering, formal methods, scenarios, traces, systems engineering, black box, system behavior, requirements definition |
61 | Zohar Shay Karnin, Amir Shpilka |
Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In. |
CCC |
2008 |
DBLP DOI BibTeX RDF |
PIT, depth-3, arithmetic circuit, deterministic, polynomial identity testing |
61 | Eric Filiol |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed, Richard Hall |
Tailoring of Black-Box Testing Methods. |
ASWEC |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Jihyun Lee, Dan Lee |
Description Technique for Component Composition Focusing on Black-Box View. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Vikraman Arvind, Bireswar Das, Partha Mukhopadhyay |
The Complexity of Black-Box Ring Problems. |
COCOON |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Tafline Murnane, Karl Reed |
On the Effectiveness of Mutation Analysis as a Black Box Testing Technique. |
Australian Software Engineering Conference |
2001 |
DBLP DOI BibTeX RDF |
|
61 | Matt Blaze |
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
60 | Aasia Riasat, Syed Sajjad Rizvi, Farheen Zehara, Faraz Arain |
The Role of System Dynamics in Learning Environments. |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Huo Yan Chen, T. H. Tse, F. T. Chan, Tsong Yueh Chen |
In Black and White: An Integrated Approach to Class-Level Testing of Object-Oriented Programs. |
ACM Trans. Softw. Eng. Methodol. |
1998 |
DBLP DOI BibTeX RDF |
software-testing methodologies, object-oriented programming, abstract data types, algebraic specification, observational equivalence |
59 | Hoijin Yoon, Byoungju Choi |
An Effective Testing Technique for Component Composition in EJBs. |
APSEC |
2001 |
DBLP DOI BibTeX RDF |
|
57 | HongDa Li 0001, Bao Li 0001 |
Existence of 3-round zero-knowledge proof systems for NP. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof |
57 | Alex Groce, Doron A. Peled, Mihalis Yannakakis |
Adaptive Model Checking. |
TACAS |
2002 |
DBLP DOI BibTeX RDF |
Learning Algorithms, Automatic Verification, Black Box Testing |
57 | Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, Ronald de Wolf |
Quantum Lower Bounds by Polynomials. |
FOCS |
1998 |
DBLP DOI BibTeX RDF |
Black-box computation, Decision trees, Quantum computation, Complexity theory |
57 | Bruce W. Weide, William F. Ogden, Murali Sitaraman |
Recasting Algorithms to Encourage Reuse. |
IEEE Softw. |
1994 |
DBLP DOI BibTeX RDF |
machine-oriented view, black-box reuse, spanning-forest algorithm, recasting, object-oriented programming, sorting, graph algorithm, objects, software reusability, sorting algorithm, performance trade-offs |
56 | Achim D. Brucker, Burkhart Wolff |
Interactive Testing with HOL-TestGen. |
FATES |
2005 |
DBLP DOI BibTeX RDF |
symbolic test case generations, theorem proving, black box testing, white box testing, interactive testing |
56 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
56 | Claus-Peter Schnorr, Serge Vaudenay |
Black Box Cryptanalysis of Hash Networks Based on Multipermutations. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
55 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Secure Arithmetic Computation with No Honest Majority. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Seung Chan Slim Lim, Peter Lucas 0002 |
JDA: a step towards large-scale reuse on the web. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
black box reuse, information devices architecture, rich web application, composition, web engineering, JavaScript, dataflow architecture |
52 | Nikolaus Hansen, Anne Auger, Raymond Ros, Steffen Finck, Petr Posík |
Comparing results of 31 algorithms from the black-box optimization benchmarking BBOB-2009. |
GECCO (Companion) |
2010 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Real-coded genetic algorithm benchmarked on noiseless black-box optimization testbed. |
GECCO (Companion) |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Thanh-Do Tran, Gang-Gyoo Jin |
Benchmarking real-coded genetic algorithm on noisy black-box optimization testbed. |
GECCO (Companion) |
2010 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization, real-coded genetic algorithm |
52 | Danilo Ardagna, Mara Tanelli, Marco Lovera, Li Zhang 0002 |
Black-box performance models for virtualized web service applications. |
WOSP/SIPEW |
2010 |
DBLP DOI BibTeX RDF |
linear parameter varying models, black box models |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Particle swarm hybridized with differential evolution: black box optimization benchmarking for noisy functions. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
noisy functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noisy black-box optimization benchmarking. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noisy function testbed. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | Peter A. N. Bosman, Jörn Grahl, Dirk Thierens |
AMaLGaM IDEAs in noiseless black-box optimization benchmarking. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, benchmarking, black-box optimization |
52 | Peter Korosec, Jurij Silc |
A stigmergy-based algorithm for black-box optimization: noiseless function testbed. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
benchmarking, black-box optimization, stigmergy |
52 | José García-Nieto, Enrique Alba 0001, Javier Apolloni |
Noiseless functions black-box optimization: evaluation of a hybrid particle swarm with differential operators. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
noiseless functions, benchmarking, differential evolution, black-box optimization, hybrid algorithms, particle swarm |
52 | Daniel Molina, Manuel Lozano 0001, Francisco Herrera |
A memetic algorithm using local search chaining for black-box optimization benchmarking 2009 for noisy functions. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
evolutionary computation, black-box optimization, memetic algorithms, hybrid metaheuristics |
52 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
52 | Jean-Guillaume Dumas, Clément Pernet, B. David Saunders |
On finding multiplicities of characteristic polynomial factors of black-box matrices. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
finite field, characteristic polynomial, black-box matrix |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno |
Privacy oracle: a system for finding application leaks with black box differential testing. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
data loss prevention, differential fuzz testing, personal information leaks, sequence alignment algorithm, black-box testing |
52 | José Daniel García, Laura Prada, Javier Fernández 0001, Alberto Nuñez, Jesús Carretero 0001 |
Using Black-Box Modeling Techniques for Modern Disk Drives Service Time Simulation. |
Annual Simulation Symposium |
2008 |
DBLP DOI BibTeX RDF |
black-box mdodelin, simulation, analytical models, i/o performance, disk drives |
52 | Lionel C. Briand, Yvan Labiche, Zaheer Bawar |
Using Machine Learning to Refine Black-Box Test Specifications and Test Suites. |
QSIC |
2008 |
DBLP DOI BibTeX RDF |
category partition, machine learning, black-box testing |
52 | Eric Koskinen, John Jannotti |
BorderPatrol: isolating events for black-box tracing. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
black box systems, causal paths, distributed systems, performance analysis, performance debugging |
52 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
52 | Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Marcos Kawazoe Aguilera, Amin Vahdat |
WAP5: black-box performance debugging for wide-area systems. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
black box systems, distributed systems, performance analysis, performance debugging |
52 | Karl Meinke |
Automated black-box testing of functional correctness using function approximation. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
formal specification, approximation, functional test, constraint solving, test coverage, black-box test, satisfiability problem |
52 | Charles Kindel |
COM: what makes it work, black-box encapsulation through multiple, immutable interfaces. |
EDOC |
1997 |
DBLP DOI BibTeX RDF |
commercial reality, black box-encapsulation, interface immutability, programming, multiple interfaces, component system, component object model, location transparency |
51 | Manfred Broy |
A uniform mathematical concept of a component (Appendix to M. Broy et al.: "What characterizes a (software) component?". |
Softw. Concepts Tools |
1998 |
DBLP DOI BibTeX RDF |
Black box specification, Component, Componentware |
50 | Ritendra Datta, Dhiraj Joshi, Jia Li 0001, James Ze Wang |
Tagging over time: real-world image annotation by lightweight meta-learning. |
ACM Multimedia |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
50 | Thomas Huining Feng, Lynn Wang, Wei Zheng, Sri Kanajan, Sanjit A. Seshia |
Interactive presentation: Automatic model generation for black box real-time systems. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ajitha Rajan |
Coverage Metrics to Measure Adequacy of Black-Box Test Suites. |
ASE |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Dragan Bosnacki |
Black Box Checking for Biochemical Networks. |
CMSB |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Vinhthuy T. Phan, Pavel Sumazin, Steven Skiena |
A Time-Sensitive System for Black-Box Combinatorial Optimization. |
ALENEX |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Amy Sundermier, Suzanne W. Dietrich, Vandana Shah |
An Active Database Approach to Integrating Black-Box Software Components. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
rule-based databases, object-oriented programming, software components, active databases |
50 | Yuri I. Ozhigov |
Quantum Computer Can Not Speed Up Iterated Applications of a Black Box. |
QCQC |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Dan Boneh, Richard J. Lipton |
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
50 | Tsong Yueh Chen, Pak-Lok Poon, Sau-Fun Tang, Yuen-Tak Yu |
White on Black: A White-Box-Oriented Approach for Selecting Black-Box-Generated Test Cases. |
APAQS |
2000 |
DBLP DOI BibTeX RDF |
specification-based testing, partition testing, test case selection, classification-tree method, Category-partition method |
50 | Emin Borandag |
İlişkisel veri tabanı kullanılan yazılımlarda black-box ve white-box test yöntemleri ile agile metodolojiye uygun bir hibrit test metodu ve uygulama yazılımının geliştirilmesi (Development of a hybrid test method complied with the agile methodology and an application software by using black-box and white-box test methods for software using relational database) |
|
2011 |
RDF |
|
50 | Sami Beydeda, Volker Gruhn, Michael Stachorski |
A Graphical Class Representation for Integrated Black- and White-Box Testing. |
ICSM |
2001 |
DBLP DOI BibTeX RDF |
Class-level testing, integrated black- and white-box testing, selective regression testing, test suite reduction |
Displaying result #1 - #100 of 5500 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|